Computation Efficient Attribute Based Broadcast Group Key Management for Secure Document Access in Public Cloud
نویسندگان
چکیده
An efficient fine-grained encryption-based access control scheme for documents stored in the public cloud network proposed by Mohamed et al utilizes more computational and storage complexities. Although, Mohamed et al.'s broadcast key management scheme communicates group key securely, it consumes massive computational and storage resources for frequently changing the group key. In order to avoid these problems, we have proposed a new broadcast group key management scheme that takes reduced computational resources by performing minimal cryptographic operations in the data owner and cloud user’s to update and recover the group key using a matrix called access control vector. The computation complexity of the data owner is reduced by performing simple arithmetic operations for updating the group key. Moreover, the computational complexity of the cloud user is also minimized by performing only one addition and two subtraction operations whenever there is a change in the group or access control policy. In addition, the proposed scheme also minimizes the storage complexity of cloud users, but maintains the same communication complexity as that of Mohamed et al.'s scheme. The performance results show that the proposed scheme is computationally efficient in the data owner and the
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملEnabling efficient and secure data sharing in cloud computing
With the rapid development of cloud computing, more and more data are being centralized into remote cloud server for sharing, which raises a challenge on how to keep them both private and accessible. Although searchable encryption provides an efficient solution to support keyword-based search directly on encrypted data, considering its application in file sharing, existing work depends on key s...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 33 شماره
صفحات -
تاریخ انتشار 2017